CEH FREE First Look Class – 20th October 2020 | 1000 hrs E.A.T

Attend this 3 hour First Look at EC-Council’s CEH course and be treated to a free preview of the Twenty modules delivered by EC-Council Certified Master Instructor Kevin Cardwell! This CEH First Look will cover some of the most important topics in each CEHModule: ·        Footprinting and Reconnaissance ·        Scanning Networks ·        Evading IDS, Firewalls, […]

FREE Live Online Training on Information System Incident Management

Join our ISACA expert and trainer Dr. Silas Oswe, on Monday the 12th of October 2020 from 6:00 p.m. to 7:00 p.m. East African Time. As he touches on how individuals and organizations should handle all system incidents. This will be inline with ISACA’s CISA (certified information systems auditor) and CISM (certified information security manager) […]

The Best Way to Protect IoT Devices (Free) Webinar

Cisco’s annual Visual Networking Index reported that the global machine-to-machine (M2M) connections supporting IoT applications are to reach 28.5 billion connected devices by 2022. However, with such rapid development comes a dark side, one that is unimaginably tempting to hackers. The security of IoT devices will be at stake. Learn how you can solve the IoT security issue before it gets out of hand.   September 30th, 2020 | 12:00 p.m. East African Time Sign […]

Identifying Vulnerabilities with Ethical Hacking, (Free) Webinar

September 23rd, 2020 | 12:00 p.m. East African Time A vulnerability is a potential loophole in a security system that gives cybercriminals an open gateway to exploit the system. It weakens the entire system and becomes the origin of a destructive cyberattack. Though vulnerabilities can be avoided, you need the right skills to do so.    Join a free webinar […]


Author: EC-Council When your business is connected to the Internet, LAN, or other methods, then the most crucial aspect for your business success and security is network security. A stable and secure network security system helps businesses from falling victim to data theft. It can protect your workstations from harmful spyware. No network is immune to attacks, but multiple layers of security in a network make […]

Big Data and Apache Hadoop Adoption

Author: Kerry Doyle Introduction Every data centre has unique hardware and software requirements that can pose significant management challenges to IT. Cloud utilization, virtualization, mobile device management, app development, security, and storage networking represent just a few of the management challenges facing IT today. Add to that the responsibility of providing the infrastructure for processing […]